Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.238.94.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.238.94.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:57:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 138.94.238.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.94.238.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
164.132.56.243 attackbots
SSH / Telnet Brute Force Attempts on Honeypot
2020-02-12 09:03:39
5.196.29.194 attackspam
Invalid user xgz from 5.196.29.194 port 59703
2020-02-12 09:03:58
222.186.30.35 attackbots
12.02.2020 00:36:18 SSH access blocked by firewall
2020-02-12 08:52:59
142.93.181.214 attackbotsspam
Feb 12 00:12:45 v22018076622670303 sshd\[6462\]: Invalid user 12345qwert from 142.93.181.214 port 32808
Feb 12 00:12:45 v22018076622670303 sshd\[6462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.181.214
Feb 12 00:12:46 v22018076622670303 sshd\[6462\]: Failed password for invalid user 12345qwert from 142.93.181.214 port 32808 ssh2
...
2020-02-12 08:55:06
123.16.149.21 attack
2020-02-1123:23:571j1dwh-0006rz-FP\<=verena@rs-solution.chH=host-203-147-83-71.h36.canl.nc\(localhost\)[203.147.83.71]:53731P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=3368id=2C299FCCC7133D8E52571EA652BBC5DE@rs-solution.chT="\;\)bepleasedtoobtainyourreplyortalkwithyou"foraf_kemp@outlook.comp.fischer@hotmail.com2020-02-1123:24:191j1dx4-0006ux-1b\<=verena@rs-solution.chH=\(localhost\)[123.16.149.21]:53344P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=3184id=5752E4B7BC6846F5292C65DD29E58981@rs-solution.chT="\;\)I'dbedelightedtoobtainyourreplyorchatwithme..."forpittardjimjam@gmail.comdavidbeasley037@gmail.com2020-02-1123:24:561j1dxW-0006ye-7T\<=verena@rs-solution.chH=mx-ll-183.89.212-25.dynamic.3bb.co.th\(localhost\)[183.89.212.25]:48974P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2905id=4F4AFCAFA4705EED31347DC531BA732E@rs-solution.chT="\;\)Iwouldbedelightedtoobta
2020-02-12 09:39:08
27.72.102.190 attack
Feb 12 01:07:37 mout sshd[26560]: Invalid user bbbbbb from 27.72.102.190 port 20146
2020-02-12 09:11:00
110.49.142.46 attack
Feb 12 01:55:32 legacy sshd[19088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.142.46
Feb 12 01:55:34 legacy sshd[19088]: Failed password for invalid user carys1 from 110.49.142.46 port 40462 ssh2
Feb 12 01:59:25 legacy sshd[19396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.142.46
...
2020-02-12 09:04:43
192.119.93.243 attackspambots
Feb 11 23:20:49 mxgate1 postfix/postscreen[3558]: CONNECT from [192.119.93.243]:51764 to [176.31.12.44]:25
Feb 11 23:20:49 mxgate1 postfix/dnsblog[3560]: addr 192.119.93.243 listed by domain zen.spamhaus.org as 127.0.0.3
Feb 11 23:20:55 mxgate1 postfix/postscreen[3558]: DNSBL rank 2 for [192.119.93.243]:51764
Feb x@x
Feb 11 23:20:56 mxgate1 postfix/postscreen[3558]: DISCONNECT [192.119.93.243]:51764


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.119.93.243
2020-02-12 09:06:16
222.186.173.154 attack
Feb 11 07:58:00 Ubuntu-1404-trusty-64-minimal sshd\[18431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Feb 11 07:58:02 Ubuntu-1404-trusty-64-minimal sshd\[18431\]: Failed password for root from 222.186.173.154 port 42670 ssh2
Feb 11 07:58:17 Ubuntu-1404-trusty-64-minimal sshd\[18488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Feb 11 07:58:20 Ubuntu-1404-trusty-64-minimal sshd\[18488\]: Failed password for root from 222.186.173.154 port 3278 ssh2
Feb 12 01:43:50 Ubuntu-1404-trusty-64-minimal sshd\[17073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-02-12 08:51:48
176.113.115.251 attackspam
Feb 12 01:59:28 debian-2gb-nbg1-2 kernel: \[3728400.231362\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.113.115.251 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=64641 PROTO=TCP SPT=57938 DPT=4078 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-12 09:01:42
49.88.112.65 attack
Feb 12 00:51:45 hcbbdb sshd\[20447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb 12 00:51:47 hcbbdb sshd\[20447\]: Failed password for root from 49.88.112.65 port 43629 ssh2
Feb 12 00:52:26 hcbbdb sshd\[20520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb 12 00:52:28 hcbbdb sshd\[20520\]: Failed password for root from 49.88.112.65 port 22127 ssh2
Feb 12 00:53:50 hcbbdb sshd\[20656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-02-12 08:59:02
183.89.237.23 attackspam
2020-02-1123:23:571j1dwh-0006rz-FP\<=verena@rs-solution.chH=host-203-147-83-71.h36.canl.nc\(localhost\)[203.147.83.71]:53731P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=3368id=2C299FCCC7133D8E52571EA652BBC5DE@rs-solution.chT="\;\)bepleasedtoobtainyourreplyortalkwithyou"foraf_kemp@outlook.comp.fischer@hotmail.com2020-02-1123:24:191j1dx4-0006ux-1b\<=verena@rs-solution.chH=\(localhost\)[123.16.149.21]:53344P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=3184id=5752E4B7BC6846F5292C65DD29E58981@rs-solution.chT="\;\)I'dbedelightedtoobtainyourreplyorchatwithme..."forpittardjimjam@gmail.comdavidbeasley037@gmail.com2020-02-1123:24:561j1dxW-0006ye-7T\<=verena@rs-solution.chH=mx-ll-183.89.212-25.dynamic.3bb.co.th\(localhost\)[183.89.212.25]:48974P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2905id=4F4AFCAFA4705EED31347DC531BA732E@rs-solution.chT="\;\)Iwouldbedelightedtoobta
2020-02-12 09:33:09
178.143.7.39 attackbots
Feb 11 21:54:58 giraffe sshd[28223]: Invalid user ftpuser from 178.143.7.39
Feb 11 21:54:58 giraffe sshd[28223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.143.7.39
Feb 11 21:55:00 giraffe sshd[28223]: Failed password for invalid user ftpuser from 178.143.7.39 port 40052 ssh2
Feb 11 21:55:00 giraffe sshd[28223]: Received disconnect from 178.143.7.39 port 40052:11: Bye Bye [preauth]
Feb 11 21:55:00 giraffe sshd[28223]: Disconnected from 178.143.7.39 port 40052 [preauth]
Feb 11 22:07:12 giraffe sshd[28687]: Invalid user zao from 178.143.7.39
Feb 11 22:07:12 giraffe sshd[28687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.143.7.39
Feb 11 22:07:15 giraffe sshd[28687]: Failed password for invalid user zao from 178.143.7.39 port 51860 ssh2
Feb 11 22:07:15 giraffe sshd[28687]: Received disconnect from 178.143.7.39 port 51860:11: Bye Bye [preauth]
Feb 11 22:07:15 giraffe sshd[28687]........
-------------------------------
2020-02-12 09:29:14
221.146.233.140 attackbotsspam
Feb 11 17:23:51 NPSTNNYC01T sshd[20907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.146.233.140
Feb 11 17:23:53 NPSTNNYC01T sshd[20907]: Failed password for invalid user etadpu from 221.146.233.140 port 47573 ssh2
Feb 11 17:26:22 NPSTNNYC01T sshd[21021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.146.233.140
...
2020-02-12 09:07:46
196.52.43.91 attack
Portscan or hack attempt detected by psad/fwsnort
2020-02-12 09:24:38

Recently Reported IPs

2.220.227.108 23.7.6.170 31.15.200.160 168.129.184.189
26.233.93.153 149.171.133.223 176.107.146.123 175.143.108.65
71.236.140.32 235.67.50.99 182.181.22.215 112.155.94.194
22.247.171.172 135.117.104.115 31.139.255.35 237.70.26.163
92.208.31.118 227.221.144.167 39.32.98.184 23.214.31.53